0% found this document useful (0 votes)
8 views

Database Clustering

The document discusses installing and using VMware Workstation Pro. It provides an overview of VMware Workstation Pro, describing it as a virtualization software that allows users to run multiple operating systems simultaneously on their Windows PC. It then outlines the steps to install VMware Workstation Pro, including searching for the software, downloading it, and guiding the user through the installation process. Key features and capabilities of VMware Workstation Pro are also summarized, such as creating and testing applications in virtual environments, running secure environments, reverting to snapshots, connecting to servers, sharing VMs, and encrypting virtual machines.

Uploaded by

jrt128azsx
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Database Clustering

The document discusses installing and using VMware Workstation Pro. It provides an overview of VMware Workstation Pro, describing it as a virtualization software that allows users to run multiple operating systems simultaneously on their Windows PC. It then outlines the steps to install VMware Workstation Pro, including searching for the software, downloading it, and guiding the user through the installation process. Key features and capabilities of VMware Workstation Pro are also summarized, such as creating and testing applications in virtual environments, running secure environments, reverting to snapshots, connecting to servers, sharing VMs, and encrypting virtual machines.

Uploaded by

jrt128azsx
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 44

**** DNS Server Configuration ****

A Project Report
Submitted by
SANJU MARANDI

In partial fulfilment for the award of the degree of


BACHELOR OF TECHNOLOGY
in
Computer Science and Engineering

DEPARTMENT OF
SCHOOL OF ENGINEERING AND TECHNOLOGY BHUBANESWAR
CAMPUS
CENTURION UNIVERSITY OF TECHNOLOGY AND MANAGEMENT
ODISHA
JULY-2023 / NOVEMBER-2023

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


SCHOOL OF ENGINEERING AND TECHNOLOGY
BHUBANESWAR CAMPUS
BONAFIDE CERTIFICATE

Certified that this project report “TOPIC NAME” is the bonafide work of

“SANJU MARANDI” who carried out the project work under my supervision.

This is to further certify to the best of my knowledge, that this project has not

been carried out earlier in this institute and the university.

SIGNATURE

Prof. Ankita Biswal


Assistant Professor of Computer Science and Engineering

Certified that the above -mentioned project has been duly carried out as per the
norms of the college and statues of the university.

SIGNATURE

Dr. Sujata Chakravarty


DEAN OF SCHOOL OF ENGINEERING AND TECHNOLOGY
Professor of Computer Science and Engineering
DECLARATION

I hereby declare that the project entitled “DNS server Configuration ” submitted

for the “Database Cluster Administrator and Security” of 7 th semester B.Tech in

Computer Science and Engineering is my original work and the project has not

formed the basis for the award any Degree / Diploma or any other similar titles

in any other University / Institute.

Name of the Student:

Signature of the Student:

Registration No.:

Place:

Date:
ACKNOWLEDGEMENTS

I wish to express my profound and sincere gratitude to Prof. Ankita Biswal,


Department of Computer Science and Engineering, SoET, Bhubaneswar
Campus, who guided me into the intricacies of this project nonchalantly with
matches magnanimity.

I think Prof. Raj Kumar Mohanta, Head of the Dept. of Department of


Computer Science and Engineering, SoET, Bhubaneswar Campus and Dr.
Sujata Chakravarty, Dean, School of Engineering and Technology,
Bhubaneswar Campus for extending their support during course of this
investigation.

I would be failing in my duty if I do not acknowledge the cooperation


rendered during various stages of image interpretation by Prof. Ankita Biswal.

I am highly grateful to Prof. Ankita Biswal who evinced keen interest


and invaluable support in the progress and successful completion of my project
work.
I am indebted to Prof. Ankita Biswal for their constant encouragement,
cooperation, and help. Words of gratitude are not enough to describe the
accommodation and fortitude which they have shown throughout my endeavor.

Name of the Student:

Signature of the Student:

Registration No.:

Place:

Date:
1. CHAPTER – 1 INTRODUCTION

VMware is a virtualization and cloud computing software provider based in Palo Alto,
Calif. Founded in 1998, VMware is a subsidiary of Dell Technologies. EMC Corporation
originally acquired VMware in 2004; EMC was later acquired by Dell Technologies in
2016. VMware bases its virtualization technologies on its bare-
metal hypervisor ESX/ESXi in x86 architecture.

With VMware server virtualization, a hypervisor is installed on the physical server to allow
for multiple virtual machines (VMs) to run on the same physical server. Each VM can run
its own operating system (OS), which means multiple OSes can run on one physical server.
All the VMs on the same physical server share resources, such as networking and RAM. In
2019, VMware added support to its hypervisor to run containerized workloads in a
Kubernetes cluster in a similar way. These types of workloads can be managed by the
infrastructure team in the same way as virtual machines and the DevOps teams can deploy
containers as they were used to.

The Domain Name System (DNS) is the phonebook of the Internet. Humans access
information online through domain names, like nytimes.com or espn.com. Web browsers
interact through Internet Protocol (IP) addresses. DNS translates domain names to IP
addresses so browsers can load Internet resources.

The process of DNS resolution involves converting a hostname (such as


www.example.com) into a computer-friendly IP address (such as 192.168.1.1). An IP
address is given to each device on the Internet, and that address is necessary to find the
appropriate Internet device - like a street address is used to find a particular home. When a
user wants to load a webpage, a translation must occur between what a user types into their
web browser (example.com) and the machine-friendly address necessary to locate the
example.com webpage.

CHAPTER – 2 Installing VMware Workstation


INSTALLING VM WARE WORKSTATION PRO IN OUR
SYSTEM..
VMware Workstation Pro is a virtualization tool that allows users to run multiple operating
systems on their Windows PC. This platform creates a safe and isolated environment for
users to create and test applications, check patches, and try different operating systems
before committing. It comes with a virtual machine library that allows users to access and
run machines whenever required. Though the program isn’t free to download, it does
come with a trial period.

What is VMware Workstation Pro?


VMware Workstation Pro is a software developed by VMware, a company leading the
sphere of virtualization. With the help of this software, users can replicate desktops,
servers, and smartphone environments on a virtual machine that exists on the user’s
computer. It also allows users to create and run simultaneous virtual machines using one
primary PC.
Virtualization offers various benefits. With it, developers can create and test cross-
platform applications, and IT employees can get unlimited access to a high-powered tool.
Additionally, students can explore and learn to use different operating systems, and
businesses can cut down on hardware costs and run multiple virtual machines using
laptops with limited system resources.

Clean and simple interface


As compared to previous versions, this one offers improved graphics speed so users can
run graphics-heavy applications like Photoshop and AutoCAD on a VM without facing
any trouble. Moreover, the program also comes integrated with a virtual machine library,
allowing users to search for and access another operating system quickly. Additionally, it
supports QHD and 4K UHD resolution for better display.

What can you do with VMware Workstation Pro?


This software creates a layer of virtualization between the host operating system and the
guest OS. This allows Windows users to run multiple operating systems like Mac OS,
Linux, and Android on their devices simultaneously. You can even use the tool to create
a virtual machine for a different version of Windows or a different server or tablet
environment.

Create and test applications


With the help of the virtualization layer, you can run apps that weren’t designed for your
Windows PC. This cross-platform operation ensures developers can create apps for
different operating systems, and also test apps without having to buy any hardware.

Run secure environments


This program download offers features that allow users to run a second system with the
utmost security. You can use the program to run an OS that has different settings for
privacy, tools, and network configurations than your primary desktop. Workstation Pro
also provides an array of tools that you can use to test for any vulnerabilities in your
virtual machine.

Reverse to a snapshot
The software allows you to take multiple snapshots of your operating system so that if
anything goes wrong, you can revert to a previous snapshot. All snapshots appear in a
complex hierarchy resembling a tree, and you can return to any snapshot whenever
required. Moreover, you can take a snapshot even when your VM is off or suspended.

Connect with other servers


This VM platform lets users connect securely with other Workstation servers
like vSphere and ESXi. By connecting to these servers, you can edit roles, change
permissions, manage power actions, and create additional VMs, among others. Through
this functionality, you can manage remote virtual machines as you would manage any
guest OS on your machine.

Share virtual machines


This virtualization program supports the sharing of virtual machines with other users
running VMware Fusion Pro or Workstation Pro. So, if you have a good internet
connection, you can connect remotely with other virtual machines. This function lets you
create one powerful host machine and allows laptops that don’t have sufficient resources
to connect and run different operating systems.

Encrypt your virtual machine


When you download this application, you get access to a control feature that lets
you encrypt and add restrictions to your VM. Encrypting a guest operating system lets
you prevent unauthorized access that might result in data breaches and editing of
configuration files. Once you encrypt your VM, the only way anyone can access it is via a
username and password.

Steps to install VMware


Step-1. Search for VM Ware workstation on Your Browser
Step-2. Search for VM Ware Workstation pro

Step-3. Click On VM Ware Workstation Pro for windows


Step-4. Go to Workstation Pro Setup Wizard And Click On Next

Step-5. Click on I accept and next


Step-6 Next.

Step-7. Accept all condition then next


Step-8 Create the shortcuts then next

Step-9 click on Install


Step-10 Then installation will proceed

Step-11 After completion Click on finish


Hence We Have successfully installed VM WARE workstation Pro in our Computer System.
2. CHAPTER 3 Database server Installation
Steps to Set up a Database server

● Start the setup wizard


● Install SQL Server Express
● Enable geodatabase storage
● Next steps

A database server is a SQL Server Express instance that has been enabled to store geodatabases. Run the Database Server setup wizard to install a SQL Server Express
instance and enable geodatabase storage.

The Microsoft Windows operating system on the machine where you setup your desktop database server must be supported for the version of SQL Server Express you
install.

Start the setup wizard


Run the Database_Server_Desktop_<version>_<part_number>.exe to start the setup wizard.

1. Log in to the computer as a user with Windows administrator privileges.

2. Close all applications on your computer.

3. Access the installation executable.

o If you downloaded the installation file from My Esri, unzip the file and run the executable.
o If you have an ISO file, use an ISO extractor to access the installation files and run the executable.

The Database Server setup wizard opens.

4. Read the information on the first window and click Next to proceed with database server setup.

If you already have an instance of SQL Server Express installed that you want to use as a database server, uncheck the Microsoft SQL Server Express Edition option in
the Installation Options dialog box and skip to Enable geodatabase storage; otherwise, proceed with SQL Server Express installation.
Install SQL Server Express
Follow these steps to install SQL Server Express on your computer using the Database Server setup wizard.

1. Leave the Microsoft SQL Server Express Edition option checked on the Installation Options dialog box and click Next.

2. The wizard prompts you to specify a location for the Microsoft SQL Server installation files. Either accept the default directory or specify your own. The directory must be empty.

The Microsoft SQL Server setup wizard opens.

3. Read and accept the Microsoft license agreement. Click Next to proceed.

If you do not accept, the installation terminates.

4. Choose to install product updates and click Next.

The setup wizard checks to be sure required components are installed on the computer, such as the Microsoft .NET Framework and Microsoft PowerShell. Some components are installed by
the Microsoft SQL Server but some you may need to download and install.

5. Provide the following information on the Feature Selection panel when it opens:

1. Be sure Database Engine Services is selected.

2. Accept default directory locations or choose your own.

6. Click Next.

7. Provide the following information on the Instance Configuration panel:

1. Be sure Named instance is selected.

2. Specify an instance name. The default name is SQLExpress. You can accept this name or type a different name.

The instance name cannot exceed 16 characters, must start with a letter, cannot contain spaces or special characters, and must not duplicate an existing instance name.

3. Accept the default location to create the instance or browse to a different location.

8. Click Next.

9. Provide the following information on the Server Configuration panel:

1. Specify accounts to run the Database Engine and Browser services or take the default accounts. See the Microsoft SQL Server documentation for information on accounts to use for
running services.

2. Be sure the Database Engine and Browser services are set to start automatically.
3. The SQL Server Express instance uses the default collation of the computer on which it is installed. If you need to choose a different collation, click the Collation tab and change the
Database Engine language before proceeding. Be sure to use a case-insensitive collation, as case-sensitive collations are not supported with ArcGIS.

10. Click Next.

11. Provide the following information on the Database Engine Configuration panel:

1. Be sure the Windows authentication mode is selected. This is the only authentication mode supported for use with the geodatabase accessed through the Database Servers node in
the Catalog tree.

2. Add an administrator user for the SQL Server Express instance.

You cannot proceed with the installation if you do not add an administrator user.

3. Click the Data Directories tab and specify the locations for your SQL Server Express files, or accept the defaults and click Next.

12. On the Error Reporting panel, you can optionally choose to send information to Microsoft. Click Next to proceed with the installation.

13. When your installation is complete, click Close to exit the Microsoft SQL Server setup wizard.

Proceed with enabling the SQL Server instance to store geodatabases.

Enable geodatabase storage


Specify the SQL Server Express instance to use as a database server and, optionally, add a server administrator to the database server.

You must be logged in as a user with sysadmin privileges in the SQL Server Express instance to run this portion of the setup. This can be the administrator user you added to
the instance in step 10b in the previous section or another sysadmin login.

Tip:
If you want to enable geodatabases using an MS-DOS command instead, see Use a command to enable SQL Server Express to store geodatabases.

Specify an instance and administrator


Specify the SQL Server Express instance you will use as a database server. You can also add another login to be a server administrator.

1. Choose the name of the SQL Server Express instance you want to use to store geodatabases from the SQL Server instance name list, for example, MyServer\SQLExpress.
Caution:
Be sure to choose the correct instance. If you mistakenly choose, for example, a SQL Server Enterprise Edition instance, the instance will not be properly enabled, and you will not be able to
create any geodatabases in SQL Server Express.

2. Type the login name of the user who will act as a server administrator on the SQL Server Express instance (the database server) you are enabling.

You added an administrator login when you installed SQL Server Express. You only need to add another login here if you want to have an additional administrator.

The login name should be the domain or machine name followed by a backslash (\) and the user's name, for example, WORLD\David. This user will not have any additional permissions at the
operating system level but will be able to perform all necessary administrator functions on the database server.

3. Click Next.

4. If you are setting up a database server to store desktop geodatabases, click Finish to exit the wizard. If you are setting up a database server to store desktop geodatabases, proceed to the Next
steps. If you are setting up a database server to store workgroup geodatabases, proceed with authorization.

Authorize a workgroup database server


You can either use the keycodes file that was created when you authorized GIS Server workgroup or the ArcGIS GIS Server workgroup license provided to you by Esri to
authorize the database server.

1. On the Authorization Options dialog box, choose the option that applies to your situation:

o Choose the first registration option, I have installed my software and need to authorize it, if you are using the ArcGIS Server workgroup license provided by Esri to authorize the
database server. Click Next to continue.
o Choose the second registration option, I have received an authorization file from Esri and am now ready to finish the authorization process, if you already authorized the GIS
Server site, or if you already requested a license file from Esri via email. Type or browse to the path and name of the file or keycodes file, which is in the \\Program Files\ESRI\
License<ArcGIS release#>\sysgen folder. Click Next and proceed to step 8.
2. If you chose I have installed my software and need to authorize it, choose an option on the Authorization Method dialog box:

oIf you have Internet access from the computer where you are running this wizard, choose Authorize with Esri now using the Internet. Choosing this method automatically
authorizes your software with Esri.
o If you do not have Internet access from the computer where you are running this wizard, choose Authorize at Esri's website or by email to receive your authorization file. This
option allows you to save your authorization information, which you can then send to Esri by email or submit to the Esri website from a computer that does have Internet access. You
will be sent an authorization file and will need to rerun the wizard to enable your geodatabase so you can authorize it.
3. You must provide information about your account to authorize the software with Esri. Type the necessary information and click Next to continue.

4. Provide information about your organization and the job you perform in the organization and click Next.

5. On the Software Authorization Number dialog box, type the GIS Server authorization number.
This number was sent to your organization along with the information on how to obtain the software. If you do not have this number, contact the person at your organization who is in charge
of your software purchases and maintenance contracts.

6. If you chose the option Authorize with Esri now using the Internet, the information you provided is automatically sent to Esri and your software is authorized. This writes an entry to the
SQL Server Express Services entry in the registry of the computer, allowing this instance of SQL Server Express to store geodatabases. Proceed to step 8.

7. If you chose the option Authorize at Esri's website or by email to receive your authorization file, you are now on the Email Authorization dialog box. Click Save to create the file that
you will either submit by email to Esri or transfer to another computer to submit via My Esri.

Once you receive your authorization file from Esri, rerun this wizard, choosing the I have received an authorization file from Esri and am now ready to finish the authorization
process option on the Authorization Options dialog box.

8. To complete the authorization, click Finish.


3. CHAPTER – 4 PROJECT WORK PART-II

3.1. General
3.2. “Section Heading”
3.3. “Section Heading”
3.3.1. “Subsection Heading”
3.4. General
3.5. “Section Heading”
3.6. “Section Heading”
3.6.1. “Subsection Heading”
3.7. General
3.8. “Section Heading”
3.9. “Section Heading”
4. CHAPTER – 5 DNS server Configuration

STEP-1. Add roles and Features


5.

STEP-2. Verify the task.


6.

STEP-3. installation type > Role Based or feature based installation.


7.
STEP-4 Adding server roles> DNS server
8.
STEP-5 Adding server roles> DNS server
9.

STEP-6 warning for validation results.


10.
STEP-7. Add Features to DNS server.
11.

STEP-8 . verifying the DNS server.


12.
STEP-9 Installation of DNS server.
13.

STEP-10 Starting the DNS server installation.


14.
STEP-11 Installation Process Complete.
15.

STEP-12 Showing DNS server in our dashboard.

CONCLUSION
In this paper, we propose a novel technique for finding client and local DNS server
associations and potentially hidden load factors in a fast, non-intrusive, and accurate
manner. Based on the results, we evaluate the proximity between clients and their
LDNS using four metrics: AS clustering, network clustering, traceroute divergence,
and round-trip time correlation.
We evaluate the potential effectiveness of DNS-based server selection in CDNs based
on these metrics. We conclude that DNS is good for very coarse-grained server
selection, since 64% of the associations belong to the same AS. DNS is less useful for
finer-grained server selection, since only 16% of clients use a DNS server in the same
network-aware cluster. These values can be improved to 88% and 66% respectively, if
clients are configured to use a closer local DNS server. Since current CDNs are not
present in many network-aware clusters, we conclude that although DNS-based server
selection has inherent limitations due to potentially poor proximity correlation between
a client and its LDNS, the impact is small due to the sparse distribution of CDN servers
in today's CDNs.
FUTURE SCOPE
Ideally, all of the devices on your network are provided DNS server settings via DHCP.
Even so, there still may be devices on your network that use manually configured DNS
servers for resolution requests. As a security practice, you should have a list of DNS
servers that are allowed to perform resolution requests, and forbid all others.

Some DNS servers aren't updated fast enough and won't be able to translate all
requests. Other more malicious DNS servers will intentionally direct traffic to malicious
websites for the purposes of infiltrating your network. Allowing requests to these servers
outbound access creates a security loophole that you want to keep closed.

REFERENCES

1. Wu, Hao; Dang, Xianglei; Wang, Lidong; He, Longtao (2016). "Information fusion‐based method for
distributed domain name system cache poisoning attack detection and identification". IET Information
Security. 10 (1): 37–44. doi:10.1049/iet-ifs.2014.0386. ISSN 1751-8717. S2CID 45091791.
2. ^ RFC 781, Internet Protocol - DARPA Internet Program Protocol Specification, Information Sciences
Institute, J. Postel (Ed.), The Internet Society (September 1981)
3. ^ J. Dilley, B. Maggs, J. Parikh, H. Prokop, R. Sitaraman, and B. Weihl. "Globally Distributed Content
Delivery, IEEE Internet Computing, September/October 2002, pp. 50–58" (PDF). Archived (PDF) from
the original on 2015-04-17.
4. ^ Nygren., E.; Sitaraman R. K.; Sun, J. (2010). "The Akamai Network: A Platform for High-Performance
Internet Applications" (PDF). ACM SIGOPS Operating Systems Review. 44 (3): 2–
19. doi:10.1145/1842733.1842736. S2CID 207181702. Archived (PDF) from the original on 2010-12-
02. Retrieved November 19, 2012.
5. ^ Jump up to:a b c d e f Mockapetris, Paul (November 1987). Domain Names - Implementation and
Specification. IETF. doi:10.17487/RFC1035. RFC 1035.
6. ^ Champika Wijayatunga (February 2015). "DNS Abuse
Handling" (PDF). APNIC. Archived (PDF) from the original on 2015-12-22. Retrieved 18
December 2016.
7. ^ RFC 3467, "Role of the Domain Name System (DNS)", J.C. Klensin, J. Klensin (February 2003).
8. ^ Liu, Cricket; Albitz, Paul (2006). DNS and BIND (5th ed.). O'Reilly Media. p. 3. ISBN 978-0-596-
10057-5.
9. ^ Evans 2018, p. 112.
10. ^ Evans 2018, p. 113.

Appendix
The appendix should contain computer programming (if any), the sample, calculations,
explanation of theory (if any) etc which will be used as reference.

ASSESSMENT
Internal:
SL FULL MARKS REMARK
RUBRICS
NO MARK OBTAINED S
Understanding the relevance, scope
1 10
and dimension of the project
2 Methodology 10
3 Quality of Analysis and Results 10
4 Interpretations and Conclusions 10
5 Report 10
Total 50

Date: Signature of the Faculty

COURSE OUTCOME (COs) ATTAINMENT

➢ Expected Course Outcomes (COs):


(Refer to COs Statement in the Syllabus)

_________________________________________________________________________
_________________________________________________________________________
__________________________________________________________________________
_________________________________________________________________________
➢ Course Outcome Attained:
How would you rate your learning of the subject based on the specified COs?

1 2 3 4 5 6 7 8 9 10
LOW HIGH
➢ Learning Gap (if any):
_________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
➢ Books / Manuals Referred:
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________

Date: Signature of the Student


➢ Suggestions / Recommendations:
(By the Course Faculty)

__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________

Date: Signature of the Faculty

BACK COVER: (1 page: single side)


44

You might also like